Synology has identified an attack campaign against its network-attached storage (NAS) devices, spearheaded by a malware named StealthWorker trying to compromise devices by logging in using common credentials.
NAS devices are prized targets, and attackers are always looking for ways to compromise them. Sometimes they use vulnerabilities, but they can be more direct at times. In the current wave of attacks, attackers try to log in using weak or common credentials. Once they’re in, they deploy malicious payloads, such as ransomware.
“Synology’s security researchers believe the botnet is primarily driven by a malware family called StealthWorker,” saidthe company. “At present, Synology PSIRT has seen no indication of the malware exploiting any software vulnerabilities.”
The attack is an automated process driven by a botnet. Compromised devices will try to carry out additional attacks against other Linux devices, including other Synology NAS.
“Synology PSIRT is working with relevant CERT organizations to find out more about and shut down known C&C (command and control) servers behind the malware. Synology is simultaneously notifying potentially affected customers,” the company also said.
Since this attack doesn’t leverage any particular vulnerability, users have been advised to change their credentials if they are weak. Synology NAS also allows users to auto-block IPs after a number of unsuccessful login attempts. Of course, it’s also essential to set up multi-step authentication as soon as possible so that, even if attackers somehow get ahold of valid credentials, they encounter another layer of security. Closing unnecessary ports that are not in use is also advisable.
NAS devices usually hold valuable information, like backups or private data. They are among the most-attacked IoT devices out there, and criminals always look for new ways to compromise them.